github.com/westcoastroms/westcoastroms-build@v0.0.0-20190928114312-2350e5a73030/build/make/tools/releasetools/check_ota_package_signature.py (about)

     1  #!/usr/bin/env python
     2  #
     3  # Copyright (C) 2016 The Android Open Source Project
     4  #
     5  # Licensed under the Apache License, Version 2.0 (the "License");
     6  # you may not use this file except in compliance with the License.
     7  # You may obtain a copy of the License at
     8  #
     9  #      http://www.apache.org/licenses/LICENSE-2.0
    10  #
    11  # Unless required by applicable law or agreed to in writing, software
    12  # distributed under the License is distributed on an "AS IS" BASIS,
    13  # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    14  # See the License for the specific language governing permissions and
    15  # limitations under the License.
    16  
    17  """
    18  Verify a given OTA package with the specifed certificate.
    19  """
    20  
    21  from __future__ import print_function
    22  
    23  import argparse
    24  import re
    25  import subprocess
    26  import sys
    27  import tempfile
    28  import zipfile
    29  
    30  from hashlib import sha1
    31  from hashlib import sha256
    32  
    33  import common
    34  
    35  
    36  def CertUsesSha256(cert):
    37    """Check if the cert uses SHA-256 hashing algorithm."""
    38  
    39    cmd = ['openssl', 'x509', '-text', '-noout', '-in', cert]
    40    p1 = common.Run(cmd, stdout=subprocess.PIPE)
    41    cert_dump, _ = p1.communicate()
    42  
    43    algorithm = re.search(r'Signature Algorithm: ([a-zA-Z0-9]+)', cert_dump)
    44    assert algorithm, "Failed to identify the signature algorithm."
    45  
    46    assert not algorithm.group(1).startswith('ecdsa'), (
    47        'This script doesn\'t support verifying ECDSA signed package yet.')
    48  
    49    return algorithm.group(1).startswith('sha256')
    50  
    51  
    52  def VerifyPackage(cert, package):
    53    """Verify the given package with the certificate.
    54  
    55    (Comments from bootable/recovery/verifier.cpp:)
    56  
    57    An archive with a whole-file signature will end in six bytes:
    58  
    59      (2-byte signature start) $ff $ff (2-byte comment size)
    60  
    61    (As far as the ZIP format is concerned, these are part of the
    62    archive comment.) We start by reading this footer, this tells
    63    us how far back from the end we have to start reading to find
    64    the whole comment.
    65    """
    66  
    67    print('Package: %s' % (package,))
    68    print('Certificate: %s' % (cert,))
    69  
    70    # Read in the package.
    71    with open(package) as package_file:
    72      package_bytes = package_file.read()
    73  
    74    length = len(package_bytes)
    75    assert length >= 6, "Not big enough to contain footer."
    76  
    77    footer = [ord(x) for x in package_bytes[-6:]]
    78    assert footer[2] == 0xff and footer[3] == 0xff, "Footer is wrong."
    79  
    80    signature_start_from_end = (footer[1] << 8) + footer[0]
    81    assert signature_start_from_end > 6, "Signature start is in the footer."
    82  
    83    signature_start = length - signature_start_from_end
    84  
    85    # Determine how much of the file is covered by the signature. This is
    86    # everything except the signature data and length, which includes all of the
    87    # EOCD except for the comment length field (2 bytes) and the comment data.
    88    comment_len = (footer[5] << 8) + footer[4]
    89    signed_len = length - comment_len - 2
    90  
    91    print('Package length: %d' % (length,))
    92    print('Comment length: %d' % (comment_len,))
    93    print('Signed data length: %d' % (signed_len,))
    94    print('Signature start: %d' % (signature_start,))
    95  
    96    use_sha256 = CertUsesSha256(cert)
    97    print('Use SHA-256: %s' % (use_sha256,))
    98  
    99    h = sha256() if use_sha256 else sha1()
   100    h.update(package_bytes[:signed_len])
   101    package_digest = h.hexdigest().lower()
   102  
   103    print('Digest: %s' % (package_digest,))
   104  
   105    # Get the signature from the input package.
   106    signature = package_bytes[signature_start:-6]
   107    sig_file = common.MakeTempFile(prefix='sig-')
   108    with open(sig_file, 'wb') as f:
   109      f.write(signature)
   110  
   111    # Parse the signature and get the hash.
   112    cmd = ['openssl', 'asn1parse', '-inform', 'DER', '-in', sig_file]
   113    p1 = common.Run(cmd, stdout=subprocess.PIPE)
   114    sig, _ = p1.communicate()
   115    assert p1.returncode == 0, "Failed to parse the signature."
   116  
   117    digest_line = sig.strip().split('\n')[-1]
   118    digest_string = digest_line.split(':')[3]
   119    digest_file = common.MakeTempFile(prefix='digest-')
   120    with open(digest_file, 'wb') as f:
   121      f.write(digest_string.decode('hex'))
   122  
   123    # Verify the digest by outputing the decrypted result in ASN.1 structure.
   124    decrypted_file = common.MakeTempFile(prefix='decrypted-')
   125    cmd = ['openssl', 'rsautl', '-verify', '-certin', '-inkey', cert,
   126           '-in', digest_file, '-out', decrypted_file]
   127    p1 = common.Run(cmd, stdout=subprocess.PIPE)
   128    p1.communicate()
   129    assert p1.returncode == 0, "Failed to run openssl rsautl -verify."
   130  
   131    # Parse the output ASN.1 structure.
   132    cmd = ['openssl', 'asn1parse', '-inform', 'DER', '-in', decrypted_file]
   133    p1 = common.Run(cmd, stdout=subprocess.PIPE)
   134    decrypted_output, _ = p1.communicate()
   135    assert p1.returncode == 0, "Failed to parse the output."
   136  
   137    digest_line = decrypted_output.strip().split('\n')[-1]
   138    digest_string = digest_line.split(':')[3].lower()
   139  
   140    # Verify that the two digest strings match.
   141    assert package_digest == digest_string, "Verification failed."
   142  
   143    # Verified successfully upon reaching here.
   144    print('\nWhole package signature VERIFIED\n')
   145  
   146  
   147  def VerifyAbOtaPayload(cert, package):
   148    """Verifies the payload and metadata signatures in an A/B OTA payload."""
   149    package_zip = zipfile.ZipFile(package, 'r')
   150    if 'payload.bin' not in package_zip.namelist():
   151      common.ZipClose(package_zip)
   152      return
   153  
   154    print('Verifying A/B OTA payload signatures...')
   155  
   156    # Dump pubkey from the certificate.
   157    pubkey = common.MakeTempFile(prefix="key-", suffix=".pem")
   158    with open(pubkey, 'wb') as pubkey_fp:
   159      pubkey_fp.write(common.ExtractPublicKey(cert))
   160  
   161    package_dir = common.MakeTempDir(prefix='package-')
   162  
   163    # Signature verification with delta_generator.
   164    payload_file = package_zip.extract('payload.bin', package_dir)
   165    cmd = ['delta_generator',
   166           '--in_file=' + payload_file,
   167           '--public_key=' + pubkey]
   168    proc = common.Run(cmd, stdout=subprocess.PIPE, stderr=subprocess.STDOUT)
   169    stdoutdata, _ = proc.communicate()
   170    assert proc.returncode == 0, \
   171        'Failed to verify payload with delta_generator: %s\n%s' % (package,
   172                                                                   stdoutdata)
   173    common.ZipClose(package_zip)
   174  
   175    # Verified successfully upon reaching here.
   176    print('\nPayload signatures VERIFIED\n\n')
   177  
   178  
   179  def main():
   180    parser = argparse.ArgumentParser()
   181    parser.add_argument('certificate', help='The certificate to be used.')
   182    parser.add_argument('package', help='The OTA package to be verified.')
   183    args = parser.parse_args()
   184  
   185    VerifyPackage(args.certificate, args.package)
   186    VerifyAbOtaPayload(args.certificate, args.package)
   187  
   188  
   189  if __name__ == '__main__':
   190    try:
   191      main()
   192    except AssertionError as err:
   193      print('\n    ERROR: %s\n' % (err,))
   194      sys.exit(1)
   195    finally:
   196      common.Cleanup()